Military Review English Edition July-August 2016 | страница 24
Current Summary
Offensive Cyberspace
Operations / Cyber
Effects Request Status
EW
EW
CYBER
TEAM
ENEMY RADAR
TYPE
Emitter
Detection
CELL
TOWER
Cyber Force
Protection
Condition
ALPHA
BRAVO
X CHARLIE
DELTA
Battle Drill in
Effect
• Network – 12D
• COMM – 4A
ENEMY
GPS JAMMER
CELL
TOWER
BLUE NETWORK STATUS
GRAY NETWORK STATUS
Enemy High Value Individual
(HVI) Cyber Personas
• Name
• Location
• Alias
AK47@
mail.com
STAT
C
Current Summary
Cyberspace
Operations Significant
Activities
TYPE
STAT
Network
Outage
Network
Impaired
Social Media*
Brigade Combat
Power
QTY
TYPE
WOLFHOUND
SHADOW
GRAY EAGLE
DUKE
CREW
3
1
1
20
48
Current Summary
Electromagnetic
Spectrum
Significant Activities
TYPE
STAT
F
Electronic
Attack
A
E
Emitter
Detection
B
E
Joint Task Force/
Division Enablers
AVAIL
TYPE
EC-130
RC-12
EA-18G
Combat
Mission Team
Cyber
Protection
Team
N
Y
Y
Y
Y
Operations: Current 24 hours
• Cyber-Electronic Warfare (EW) Support to Task Force (TF) Falcon during
Operation RAZORBACK FURY
• Cyber-EW Support to TF Hawk vicinity: Objectives ANVIL and HAMMER
• Intel & Cyber-EW support to TF Dragon vicinity: Objective SAWBLADE
HVI #1
Operations: Next 24 hours
RED NETWORK STATUS
HVI #2
HVI #3
• SHADOW electronic attack on target (38S GH 12345, 54321)
• Counter UAS
• Cyber support to brigade combat team strategic messaging
(Graphic from authors)
Figure. Sample Cyber Situational Understanding Overlay on the Common
Operational Picture
must ascertain what information regarding cyberspace
matters most to commanders.
During combat operations, commanders, supported
by their staffs, monitor and assess progress, make decisions to exploit opportunities and counter threats, and
direct the application of combat power at decisive points
in time.28 Cyberspace is a significant part of that calculus,
especially concerning its effects on mission command and
highly networked forms of combat power. Information
that will likely comprise the basic content of the cyber SU
overlay for the COP include friendly, host-nation, and
enemy network status, cyber threats and enemy capabilities, key cyberspace infrastructure in the area of operations, cyberspace authorities and rules of engagement,
and social media trends, to name a few.
Second, capability developers must consider where
cyber SU information comes from and how to obtain it.
22
Currently, only joint cyber mission forces are authorized
to conduct cyberspace intelligence, surveillance, and
reconnaissance and cyberspace operational preparation of the environment. So a great deal of information
about cyberspace will originate and reside in databases
at the national and strategic levels. That said, relevant
data and information derived from organic information
collection efforts at Army tactical echelons can provide
important context.
One practical example is connecting a cyber-persona, derived from a national or joint cyberspace
asset, with the identity of a real person (or organization) known to be residing in a unit’s OE, as derived
through local information collection. Fusing these
sources provides greater situational understanding for
the tactical commander and will help higher headquarters see cyberspace more clearly.
July-August 2016 MILITARY REVIEW